• Least privileged Microsoft Graph permission to access the action via application: SSecurityIncident.Read.All*.
  • Higher privileged Microsoft Graph permission to access the action via application: SecurityIncident.ReadWrite.All.

To learn more, visit the Microsoft Defender XDR documentation.

Parameters

ParameterDescription
CountThe $count query parameter is used to retrieve the count of the total number of items in a collection or matching an expression. For more information on using $count, refer to Microsoft Query Parameters Documentation.
ExpandThe $expand query string parameter is used to include the expanded resource or collection (like alerts) referenced by a single relationship (navigation property) in your results. For more information on using $expand, refer to Microsoft Query Parameters Documentation.
FilterThe $filter query parameter is used to retrieve a subset of a collection. For more information on using $filter, refer to Microsoft Query Parameters Documentation.The following properties are supported:- assignedTo
  • classification
  • determination
  • createdDateTime
  • lastUpdateDateTime
  • severity
  • status | | Skip | The $skip query parameter is used to set the number of items to skip at the start of a collection. For more information on using $skip, refer to Microsoft Query Parameters Documentation. | | Top | The $top query parameter is used to specify the number of items to be included in the result. For more information on using $top, refer to Microsoft Query Parameters Documentation. |

Example Output

{    "value": [        {            "@odata.type": "#microsoft.graph.security.incident",            "id": "2972395",            "incidentWebUrl": "https://security.microsoft.com/incidents/2972395?tid=12f988bf-16f1-11af-11ab-1d7cd011db47",            "redirectIncidentId": null,            "tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",            "displayName": "Multi-stage incident involving Initial access & Command and control on multiple endpoints reported by multiple sources",            "createdDateTime": "2021-08-13T08:43:35.5533333Z",            "lastUpdateDateTime": "2021-09-30T09:35:45.1133333Z",            "assignedTo": "KaiC@contoso.com",            "classification": "TruePositive",            "determination": "MultiStagedAttack",            "status": "Active",            "severity": "Medium",            "customTags": [                "Demo"            ],            "comments": [                {                    "comment": "Demo incident",                    "createdBy": "DavidS@contoso.com",                    "createdTime": "2021-09-30T12:07:37.2756993Z"                }            ],            "systemTags": [                "Defender Experts"            ],            "description": "Microsoft observed Raspberry Robin worm activity spreading through infected USB on multiple devices in your environment. From available intel, these infections could be a potential precursor activity to ransomware deployment. ...",            "summary": "Defender Experts has identified some malicious activity. This incident has been raised for your awareness and should be investigated as normal."        }    ]}

Workflow Library Example

List Incidents with Microsoft Defender Xdr and Send Results Via Email

Preview this Workflow on desktop